Title: Design for Privacy
1Design for Privacy
2Outline
- Engineering privacy
- Design of privacy tools
- Design for privacy in everyday software
- Obtaining informed consent
3Engineering privacy
Privacy stages identifiability Approach to privacy protection Linkability of data to personal identifiers System Characteristics
0 identified privacy bypolicy (notice and choice) linked unique identifiers across databases contact information stored with profile information
1 pseudonymous privacy bypolicy (notice and choice) linkable withreasonable automatableeffort no unique identifies across databases common attributes across databases contact information stored separately from profile or transaction information
2 pseudonymous privacy byarchitecture not linkable withreasonable effort no unique identifiers across databases no common attributes across databases random identifiers contact information stored separately from profile or transaction information collection of long term person characteristics on a low level of granularity technically enforced deletion of profile details at regular intervals
3 anonymous privacy byarchitecture unlinkable no collection of contact information no collection of long term person characteristics k-anonymity with large value of k
4Design of Privacy Tools
5Privacy tool examples
- Cookie managers
- Anonymizers
- Encryption tools
- Disk wiping utilities
- P3P user agents
6Issues to consider
- Privacy is a secondary task
- Users of privacy tools often seek out these tools
due to their awareness of or concern about
privacy - Even so, users still want to focus on their
primary tasks - Users have differing privacy concerns and needs
- One-size-fits-all interface may not work
- Most users are not privacy experts
- Difficult to explain current privacy state or
future privacy implications - Difficult to explain privacy options to them
- Difficult to capture privacy needs/preferences
- Many privacy tools reduce application
performance, functionality, or convenience
7Case study Tor
- Internet anonymity system
- Allows users to send messages that cannot be
traced back to them (web browsing, chat, p2p,
etc.) - UI was mostly command line interface until
recently - 2005 Tor GUI competition
- CUPS team won phase 1 with design for Foxtor!
8One-size-doesnt-fit-all problem
- Tor is configurable and different users will want
to configure it in different ways - But most users wont understand configuration
options - Give users choices, not dilemmas
- We began by trying to understand our users
- No budget, little time, limited access to users
- So we brainstormed about their needs, tried to
imagine them, and develop personas for them - This process led to realization that our users
had 3 categories of privacy needs - Basic, selective, critical
- Instead of asking users to figure out complicated
settings, most of our configuration involves
figuring out which types of privacy needs they
have
9(No Transcript)
10Understand primary task
- Anonymity is not a primary task
- What are the primary tasks our users are engaged
in when they want anonymity? - Lots of them . Web browsing, chatting, file
sharing, etc., but we speculate that browsing
will be most frequent for most users - So, instead of building anonymity tool that you
can use to anonymize web browsing - build a web browser with built in anonymity
functions
11Metaphors
- Because of performance issues and problems
accessing some web sites through Tor, some users
will want to turn the anonymity function on and
off - Important to make it easy for users to determine
current state - Communicate through visual symbol and readily
understandable metaphor - Brainstormed possibilities torized/untorized,
private/exposed, cloaked/uncloaked,
masked/unmasked
12(No Transcript)
13Design for privacy in every day software
14Examples
- Ecommerce personalization systems
- Concerns about use of user profiles
- Software that phones home to fetch software
updates or refresh content, report bugs, relay
usage data, verify authorization keys, etc. - Concerns that software will track and profile
users - Communications software (email, IM, chat)
- Concerns about traffic monitoring, eavesdroppers
- Presence systems (buddy lists, shared spaces,
friend finders) - Concerns about limiting when info is shared and
with whom
15Issues to consider
- Similar to issues to consider for privacy tools
PLUS - Users may not be aware of privacy issues up front
- When they find out about privacy issues they may
be angry or confused, especially if they view
notice as inadequate or defaults as unreasonable - Users may have to give up functionality or
convenience, or spend more time configuring
system for better privacy - Failure to address privacy issues adequately may
lead to bad press and legal action
16The Prada NYC dressing room
- http//www.sggprivalite.com/
- What aspects seem privacy invasive?
- How could the design be changed to reduce privacy
concerns?
17Amazon.com privacy makeover
18Streamline menu navigation for customization
19Provide way to set up default rules
- Every time a user makes a new purchase that they
want to rate or exclude they have to edit profile
info - There should be a way to set up default rules
- Exclude all purchases
- Exclude all purchases shipped to my work address
- Exclude all movie purchases
- Exclude all purchases I had gift wrapped
20Remove excluded purchases from profile
- Users should be able to remove items from profile
- If purchase records are needed for legal reasons,
users should be able to request that they not be
accessible online
21Better options for controlling recent history
22Use personae
- Amazon already allows users to store multiple
credit cards and addresses - Why not allow users to create personae linked to
each with option of keeping recommendations and
history separate (would allow easy way to
separate work/home/gift personae)?
23Allow users to access all privacy-related options
in one place
- Currently privacy-related options are found with
relevant features - Users have to be aware of features to find the
options - Put them all in one place
- But also leave them with relevant features
24I didnt buy it for myself
- How about an I didnt buy it for myself
check-off box (perhaps automatically checked if
gift wrapping is requested)
I didnt buy it for myself
25Other ideas for improving Amazon privacy
interface?
26Obtaining informed consent
- Many software products contain phone home
features, for example, for performing software
updates or monitoring usage patterns. In some
cases software phones homes quite frequently, for
example, to update phishing black lists or check
for fresh image files. Users may be concerned
that the software company is using these features
to track or profile them. Thus it is important
that the software is up front about the fact that
it is phoning home. Furthermore, some users may
wish to disable such features or be prompted
every time before they phone home (due to privacy
or other concerns), whereas other users are happy
to have them operate automatically. - Discuss the various approaches you have seen
different software manufacturers take to
addressing this problem. What do you like/dislike
about them? - How should phone home features be designed so
that they facilitate informed consent? Describe
an example user interface design and general
principles that might be applied to specific
cases. - What sort of user studies should be performed to
test this user interface design?